πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-10292 β€Ό

Visual Components (owned by KUKA) is a robotic simulator that allows simulating factories and robots in order toimprove planning and decision-making processes. Visual Components software requires a special license which can beobtained from a network license server. The network license server binds to all interfaces (0.0.0.0) and listensfor packets over UDP port 5093. No authentication/authorization is required in order to communicate with theserver. The protocol being used is a property protocol by RMS Sentinel which provides the licensing infrastructurefor the network license server. RMS Sentinel license manager service exposes UDP port 5093 which provides sensitivesystem information that could be leveraged for further exploitation without any kind of authentication. Thisinformation includes detailed hardware and OS characteristics.After a decryption process, a textual protocol is found which contains a simple header with the requested command,application-identifier, and some arguments. The protocol is vulnerable to DoS through an arbitrary pointerderreference. This flaw allows an attacker to to pass a specially crafted package that, when processed by theservice, causes an arbitrary pointer from the stack to be dereferenced, causing an uncaught exception thatterminates the service. This can be further contructed in combination with RVDP#710 which exploits an informationdisclosure leak, or with RVDP#711 for an stack-overflow and potential code execution.Beyond denying simulations, Visual Components provides capabilities to interface with industrial machinery andautomate certain processes (e.g. testing, benchmarking, etc.) which depending on the DevOps setup might beintegrated into the industrial flow. Accordingly, a DoS in the simulation might have higher repercusions, dependingon the Industrial Control System (ICS) ICS infrastructure.

πŸ“– Read

via "National Vulnerability Database".
❌ Apple Patches Bugs Tied to Previously Identified Zero-Days ❌

The actively exploited vulnerabilities discovered by Project Zero exist across iPhone, iPad and iPod devices.

πŸ“– Read

via "Threat Post".
πŸ•΄ How COVID-19 Changed the VC Investment Landscape for Cybersecurity Companies πŸ•΄

What trends can startups and investors expect to see going forward?

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-26882 β€Ό

In Play Framework 2.6.0 through 2.8.2, data amplification can occur when an application accepts multipart/form-data JSON input.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27589 β€Ό

Synopsys hub-rest-api-python (aka blackduck on PyPI) version 0.0.25 - 0.0.52 does not validate SSL certificates in certain cases.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4483 β€Ό

IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 181857.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4484 β€Ό

IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 could disclose sensitive information to an authenticated user that could be used in further attacks against the system. IBM X-Force ID: 181858.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4482 β€Ό

IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 could allow an authenticated user to bypass security. A user with access to a snapshot could apply unauthorized additional statuses via direct rest calls. IBM X-Force ID: 181856.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27196 β€Ό

An issue was discovered in PlayJava in Play Framework 2.6.0 through 2.8.2. The body parsing of HTTP requests eagerly parses a payload given a Content-Type header. A deep JSON structure sent to a valid POST endpoint (that may or may not expect JSON payloads) causes a StackOverflowError and Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26883 β€Ό

In Play Framework 2.6.0 through 2.8.2, stack consumption can occur because of unbounded recursion during parsing of crafted JSON documents.

πŸ“– Read

via "National Vulnerability Database".
⚠ Black Friday – stay safe before, during and after peak retail season ⚠

Yes, we give Black Friday tips every year - but that's because they're worth doing every year!

πŸ“– Read

via "Naked Security".
🦿 How to view your SSH keys in Linux, macOS, and Windows 🦿

If you're not sure how to view your SSH certificates, Jack Wallen walks you through the steps on Linux, macOS, and Windows.

πŸ“– Read

via "Tech Republic".
πŸ” Friday Five 11/6 πŸ”

New privacy laws, botnet schemes, and Bitcoin seizures - catch up on all the week's infosec news with the Friday Five!

πŸ“– Read

via "Digital Guardian".
πŸ•΄ Name That Toon: Masks and Manners πŸ•΄

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-8580 β€Ό

SANtricity OS Controller Software versions 11.30 and higher are susceptible to a vulnerability which allows an unauthenticated attacker with access to the system to cause a Denial of Service (DoS).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-7198 β€Ό

There is a remote escalation of privilege possible for a malicious user that has a OneView account in OneView and Synergy Composer. HPE has provided updates to Oneview and Synergy Composer: Update to version 5.5 of OneView, Composer, or Composer2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-5795 β€Ό

UNIX Symbolic Link (Symlink) Following in TP-Link Archer A7(US)_V5_200721 allows an authenticated admin user, with physical access and network access, to execute arbitrary code after plugging a crafted USB drive into the router.

πŸ“– Read

via "National Vulnerability Database".
❌ Gitpaste-12 Worm Targets Linux Servers, IoT Devices ❌

The newly discovered malware uses GitHub and Pastebin to house component code, and harbors 12 different initial attack vectors.

πŸ“– Read

via "Threat Post".
πŸ•΄ The Oracle-Walmart-TikTok Deal Is Not Enough πŸ•΄

The social media deal raises issues involving data custodianship and trusted tech partnerships.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-25170 β€Ό

An Excel Macro Injection vulnerability exists in the export feature in the B. Braun OnlineSuite Version AP 3.0 and earlier via multiple input fields that are mishandled in an Excel export.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26214 β€Ό

In Alerta before version 8.1.0, users may be able to bypass LDAP authentication if they provide an empty password when Alerta server is configure to use LDAP as the authorization provider. Only deployments where LDAP servers are configured to allow unauthenticated authentication mechanism for anonymous authorization are affected. A fix has been implemented in version 8.1.0 that returns HTTP 401 Unauthorized response for any authentication attempts where the password field is empty. As a workaround LDAP administrators can disallow unauthenticated bind requests by clients.

πŸ“– Read

via "National Vulnerability Database".